Skip to content

Commit 3032006

Browse files
authored
Merge branch 'public' into patch-3
2 parents 96d3ce5 + 7c3c056 commit 3032006

File tree

3 files changed

+6
-17
lines changed

3 files changed

+6
-17
lines changed

.openpublishing.redirection.ata-atp.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,17 +17,17 @@
1717
},
1818
{
1919
"source_path": "ATPDocs/deploy/quick-installation-guide.md",
20-
"redirect_url": "deploy/deploy-defender-identity",
20+
"redirect_url": "deploy-defender-identity",
2121
"redirect_document_id": false
2222
},
2323
{
2424
"source_path": "ATPDocs/deploy/prerequisites.md",
25-
"redirect_url": "deploy/prerequisites-sensor-version-2",
25+
"redirect_url": "prerequisites-sensor-version-2",
2626
"redirect_document_id": false
2727
},
2828
{
2929
"source_path": "ATPDocs/deploy/activate-capabilities.md",
30-
"redirect_url": "deploy/activate-sensor",
30+
"redirect_url": "activate-sensor",
3131
"redirect_document_id": false
3232
},
3333
{

CloudAppSecurityDocs/app-onboarding.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ All SaaS applications that exist in the Microsoft Entra ID catalog will be avail
2626

2727
Fully performing and testing the procedures in this article requires that you have a session or access policy configured. For more information, see:
2828

29-
- [Create Microsoft Defender for Cloud Apps access policies](https://example.com)
30-
- [Create Microsoft Defender for Cloud Apps session policies](https://example.com)
29+
- [Create Microsoft Defender for Cloud Apps access policies](access-policy-aad.md)
30+
- [Create Microsoft Defender for Cloud Apps session policies](session-policy-aad.md)
3131

3232
## Supported Apps
3333

defender-xdr/phishing-triage-agent.md

Lines changed: 1 addition & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -139,17 +139,6 @@ To assign the appropriate permissions to the agent:
139139
> [!TIP]
140140
> Microsoft advises assigning a role to the agent's identity that includes only the minimum permissions necessary.
141141
142-
1. Assign the agent's identity contributor access to your Microsoft Security Copilot workspace.
143-
144-
1. Sign in to Security Copilot (https://securitycopilot.microsoft.com).
145-
1. Select the home menu icon.
146-
1. Make sure you're in your default workspace.
147-
1. Select **Role assignment > Add members**.
148-
1. Start typing the name of agent identity in the **Add members** dialog box.
149-
1. Select the identity.
150-
1. Select **Contributor**.
151-
1. Select **Add**.
152-
153142
After assigning the agent its permissions, ensure the user group monitoring the agent has equal or higher permissions to oversee its activity and output. To do this, compare the permissions of the user group to the agent in the Permissions page in the Microsoft Defender portal.
154143

155144
#### Conditional access policies
@@ -427,4 +416,4 @@ The Phishing Triage Agent operates within a zero-trust environment. The system e
427416
## Related content
428417

429418
- [Microsoft Security Copilot agents](/copilot/security/agents-overview)
430-
- [Responsible AI FAQs for Security Copilot Agent](/copilot/security/rai-faqs-security-copilot-agents)
419+
- [Responsible AI FAQs for Security Copilot Agent](/copilot/security/rai-faqs-security-copilot-agents)

0 commit comments

Comments
 (0)